[ GLSA 201801-18 ] Newsbeuter: User-assisted execution of arbitrary code

\n\n–nextPart6163601.ip7Nb6PYzB
Content-Type: multipart/alternative; boundary=”nextPart12351956.ui4cC59eKW”
Content-Transfer-Encoding: 7Bit

This is a multi-part message in MIME format.

–nextPart12351956.ui4cC59eKW
Content-Transfer-Encoding: 7Bit
Content-Type: text/plain; charset=”us-ascii”

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201801-18
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: Normal
Title: Newsbeuter: User-assisted execution of arbitrary code
Date: January 17, 2018
Bugs: #628796
ID: 201801-18

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
========

Insufficient input validation in Newsbeuter may allow remote attackers
to execute arbitrary shell commands.

Background
==========

Newsbeuter is a RSS/Atom feed reader for the text console.

Affected packages
=================

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 net-news/newsbeuter = 2.9-r3

Description
===========

Newsbeuter does not properly escape shell meta-characters in the title
and description of RSS feeds when bookmarking.

Impact
======

A remote attacker, by enticing a user to open a feed with specially
crafted URLs, could possibly execute arbitrary shell commands with the
privileges of the user running the application.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Newsbeuter users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=net-news/newsbeuter-2.9-r3″

References
==========

[ 1 ] CVE-2017-12904
https://nvd.nist.gov/vuln/detail/CVE-2017-12904

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201801-18

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======
–nextPart12351956.ui4cC59eKW
Content-Transfer-Encoding: 7Bit
Content-Type: text/html; charset=”us-ascii”

p, li { white-space: pre-wrap; }

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Gentoo Linux Security Advisory GLSA 201801-18

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

https://security.gentoo.org/

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

 

Severity: Normal

Title: Newsbeuter: User-assisted execution of arbitrary code

Date: January 17, 2018

Bugs: #628796

ID: 201801-18

 

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

 

Synopsis

========

 

Insufficient input validation in Newsbeuter may allow remote attackers

to execute arbitrary shell commands.

 

Background

==========

 

Newsbeuter is a RSS/Atom feed reader for the text console.

 

Affected packages

=================

 

——————————————————————-

Package / Vulnerable / Unaffected

——————————————————————-

1 net-news/newsbeuter < 2.9-r3 >= 2.9-r3

 

Description

===========

 

Newsbeuter does not properly escape shell meta-characters in the title

and description of RSS feeds when bookmarking.

 

Impact

======

 

A remote attacker, by enticing a user to open a feed with specially

crafted URLs, could possibly execute arbitrary shell commands with the

privileges of the user running the application.

 

Workaround

==========

 

There is no known workaround at this time.

 

Resolution

==========

 

All Newsbeuter users should upgrade to the latest version:

 

# emerge –sync

# emerge –ask –oneshot –verbose ">=net-news/newsbeuter-2.9-r3"

 

References

==========

 

[ 1 ] CVE-2017-12904

https://nvd.nist.gov/vuln/detail/CVE-2017-12904

 

Availability

============

 

This GLSA and any updates to it are available for viewing at

the Gentoo Security Website:

 

https://security.gentoo.org/glsa/201801-18

 

Concerns?

=========

 

Security is a primary focus of Gentoo Linux and ensuring the

confidentiality and security of our users’ machines is of utmost

importance to us. Any security concerns should be addressed to

security@gentoo.org or alternatively, you may file a bug at

https://bugs.gentoo.org.

 

License

=======

 

Copyright 2018 Gentoo Foundation, Inc; referenced text

belongs to its owner(s).

 

The contents of this document are licensed under the

Creative Commons – Attribution / Share Alike license.

 

https://creativecommons.org/licenses/by-sa/2.5

–nextPart12351956.ui4cC59eKW–

–nextPart6163601.ip7Nb6PYzB
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part.
Content-Transfer-Encoding: 7Bit

—–BEGIN PGP SIGNATURE—–

iQEzBAABCAAdFiEEiDRK3jyVBE/RkymqpRQw84X1dt0FAlpfU6QACgkQpRQw84X1
dt06+QgAhnmfKakcSKZ9iEogISG8hbLZ3S5WndL/X9XiOMmSmibUuV9kye3FjFdp
j1WUVOWeOJcDoMnj+nsp8T5m/dsv51krAbryia1a8sDa295njK0LjZbiEt9jTNKW
sPlxTQQl31UjfsqDW2skYGnxsJxXFfX5FQ8VZHFMN7LA7/C098PiW6c7gODn0Wcj
1Uhu6Facvstxe5AmRT4uaIIavi7za+8BPxevKBrwiheqNLZkj451dZ5IZw2qPde4
FkAuX3500twfdRckuk4y48t0MWutkaPGYeheSnIteawzQ3ZlKFYLz/VLDQuW9Gqt
4pbrSFZ0fs5aiTwpU6eRL3sTIstRhA==
=/gFZ
—–END PGP SIGNATURE—–

–nextPart6163601.ip7Nb6PYzB–